{"title":"A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy","authors":"A. D. Santis, A. L. Ferrara, B. Masucci","doi":"10.1007/11779360_17","DOIUrl":"https://doi.org/10.1007/11779360_17","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127733989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interpolation of Functions Related to the Integer Factoring Problem","authors":"Clemens Adelmann, Arne Winterhof","doi":"10.1007/11779360_12","DOIUrl":"https://doi.org/10.1007/11779360_12","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Geometric Conditions for the Extendability of Ternary Linear Codes","authors":"T. Maruta, Kei Okamoto","doi":"10.1007/11779360_8","DOIUrl":"https://doi.org/10.1007/11779360_8","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121868702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Open Problems Related to Algebraic Attacks on Stream Ciphers","authors":"A. Canteaut","doi":"10.1007/11779360_10","DOIUrl":"https://doi.org/10.1007/11779360_10","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Weights of Binary Irreducible Cyclic Codes","authors":"Y. Aubry, P. Langevin","doi":"10.1007/11779360_5","DOIUrl":"https://doi.org/10.1007/11779360_5","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129966382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation","authors":"N. Yu, G. Gong","doi":"10.1007/11779360_29","DOIUrl":"https://doi.org/10.1007/11779360_29","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132054234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative Diversity","authors":"A. R. Hammons","doi":"10.1007/11779360_7","DOIUrl":"https://doi.org/10.1007/11779360_7","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133151590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Finding Good Differential Patterns for Attacks on SHA-1","authors":"K. Matusiewicz, J. Pieprzyk","doi":"10.1007/11779360_14","DOIUrl":"https://doi.org/10.1007/11779360_14","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Welch-Berlekamp Like Algorithm for Decoding Gabidulin Codes","authors":"P. Loidreau","doi":"10.1007/11779360_4","DOIUrl":"https://doi.org/10.1007/11779360_4","url":null,"abstract":"","PeriodicalId":141956,"journal":{"name":"International Workshop on Coding and Cryptography","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125055080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}